handler.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448
  1. package ftpd
  2. import (
  3. "errors"
  4. "io"
  5. "os"
  6. "path"
  7. "time"
  8. ftpserver "github.com/fclairamb/ftpserverlib"
  9. "github.com/spf13/afero"
  10. "github.com/drakkan/sftpgo/common"
  11. "github.com/drakkan/sftpgo/dataprovider"
  12. "github.com/drakkan/sftpgo/logger"
  13. "github.com/drakkan/sftpgo/vfs"
  14. )
  15. var (
  16. errNotImplemented = errors.New("not implemented")
  17. errCOMBNotSupported = errors.New("COMB is not supported for this filesystem")
  18. )
  19. // Connection details for an FTP connection.
  20. // It implements common.ActiveConnection and ftpserver.ClientDriver interfaces
  21. type Connection struct {
  22. *common.BaseConnection
  23. clientContext ftpserver.ClientContext
  24. }
  25. // GetClientVersion returns the connected client's version.
  26. // It returns "Unknown" if the client does not advertise its
  27. // version
  28. func (c *Connection) GetClientVersion() string {
  29. version := c.clientContext.GetClientVersion()
  30. if len(version) > 0 {
  31. return version
  32. }
  33. return "Unknown"
  34. }
  35. // GetRemoteAddress return the connected client's address
  36. func (c *Connection) GetRemoteAddress() string {
  37. return c.clientContext.RemoteAddr().String()
  38. }
  39. // Disconnect disconnects the client
  40. func (c *Connection) Disconnect() error {
  41. return c.clientContext.Close()
  42. }
  43. // GetCommand returns the last received FTP command
  44. func (c *Connection) GetCommand() string {
  45. return c.clientContext.GetLastCommand()
  46. }
  47. // Create is not implemented we use ClientDriverExtentionFileTransfer
  48. func (c *Connection) Create(name string) (afero.File, error) {
  49. return nil, errNotImplemented
  50. }
  51. // Mkdir creates a directory using the connection filesystem
  52. func (c *Connection) Mkdir(name string, perm os.FileMode) error {
  53. c.UpdateLastActivity()
  54. return c.CreateDir(name)
  55. }
  56. // MkdirAll is not implemented, we don't need it
  57. func (c *Connection) MkdirAll(path string, perm os.FileMode) error {
  58. return errNotImplemented
  59. }
  60. // Open is not implemented we use ClientDriverExtentionFileTransfer and ClientDriverExtensionFileList
  61. func (c *Connection) Open(name string) (afero.File, error) {
  62. return nil, errNotImplemented
  63. }
  64. // OpenFile is not implemented we use ClientDriverExtentionFileTransfer
  65. func (c *Connection) OpenFile(name string, flag int, perm os.FileMode) (afero.File, error) {
  66. return nil, errNotImplemented
  67. }
  68. // Remove removes a file.
  69. // We implements ClientDriverExtensionRemoveDir for directories
  70. func (c *Connection) Remove(name string) error {
  71. c.UpdateLastActivity()
  72. fs, p, err := c.GetFsAndResolvedPath(name)
  73. if err != nil {
  74. return err
  75. }
  76. var fi os.FileInfo
  77. if fi, err = fs.Lstat(p); err != nil {
  78. c.Log(logger.LevelWarn, "failed to remove a file %#v: stat error: %+v", p, err)
  79. return c.GetFsError(fs, err)
  80. }
  81. if fi.IsDir() && fi.Mode()&os.ModeSymlink == 0 {
  82. c.Log(logger.LevelDebug, "cannot remove %#v is not a file/symlink", p)
  83. return c.GetGenericError(nil)
  84. }
  85. return c.RemoveFile(fs, p, name, fi)
  86. }
  87. // RemoveAll is not implemented, we don't need it
  88. func (c *Connection) RemoveAll(path string) error {
  89. return errNotImplemented
  90. }
  91. // Rename renames a file or a directory
  92. func (c *Connection) Rename(oldname, newname string) error {
  93. c.UpdateLastActivity()
  94. if err := c.BaseConnection.Rename(oldname, newname); err != nil {
  95. return err
  96. }
  97. return nil
  98. }
  99. // Stat returns a FileInfo describing the named file/directory, or an error,
  100. // if any happens
  101. func (c *Connection) Stat(name string) (os.FileInfo, error) {
  102. c.UpdateLastActivity()
  103. if !c.User.HasPerm(dataprovider.PermListItems, path.Dir(name)) {
  104. return nil, c.GetPermissionDeniedError()
  105. }
  106. fi, err := c.DoStat(name, 0)
  107. if err != nil {
  108. c.Log(logger.LevelDebug, "error running stat on path %#v: %+v", name, err)
  109. return nil, err
  110. }
  111. return fi, nil
  112. }
  113. // Name returns the name of this connection
  114. func (c *Connection) Name() string {
  115. return c.GetID()
  116. }
  117. // Chown changes the uid and gid of the named file
  118. func (c *Connection) Chown(name string, uid, gid int) error {
  119. c.UpdateLastActivity()
  120. return common.ErrOpUnsupported
  121. /*p, err := c.Fs.ResolvePath(name)
  122. if err != nil {
  123. return c.GetFsError(err)
  124. }
  125. attrs := common.StatAttributes{
  126. Flags: common.StatAttrUIDGID,
  127. UID: uid,
  128. GID: gid,
  129. }
  130. return c.SetStat(p, name, &attrs)*/
  131. }
  132. // Chmod changes the mode of the named file/directory
  133. func (c *Connection) Chmod(name string, mode os.FileMode) error {
  134. c.UpdateLastActivity()
  135. attrs := common.StatAttributes{
  136. Flags: common.StatAttrPerms,
  137. Mode: mode,
  138. }
  139. return c.SetStat(name, &attrs)
  140. }
  141. // Chtimes changes the access and modification times of the named file
  142. func (c *Connection) Chtimes(name string, atime time.Time, mtime time.Time) error {
  143. c.UpdateLastActivity()
  144. attrs := common.StatAttributes{
  145. Flags: common.StatAttrTimes,
  146. Atime: atime,
  147. Mtime: mtime,
  148. }
  149. return c.SetStat(name, &attrs)
  150. }
  151. // GetAvailableSpace implements ClientDriverExtensionAvailableSpace interface
  152. func (c *Connection) GetAvailableSpace(dirName string) (int64, error) {
  153. c.UpdateLastActivity()
  154. quotaResult := c.HasSpace(false, false, path.Join(dirName, "fakefile.txt"))
  155. if !quotaResult.HasSpace {
  156. return 0, nil
  157. }
  158. if quotaResult.AllowedSize == 0 {
  159. // no quota restrictions
  160. if c.User.Filters.MaxUploadFileSize > 0 {
  161. return c.User.Filters.MaxUploadFileSize, nil
  162. }
  163. fs, p, err := c.GetFsAndResolvedPath(dirName)
  164. if err != nil {
  165. return 0, err
  166. }
  167. statVFS, err := fs.GetAvailableDiskSize(p)
  168. if err != nil {
  169. return 0, c.GetFsError(fs, err)
  170. }
  171. return int64(statVFS.FreeSpace()), nil
  172. }
  173. // the available space is the minimum between MaxUploadFileSize, if setted,
  174. // and quota allowed size
  175. if c.User.Filters.MaxUploadFileSize > 0 {
  176. if c.User.Filters.MaxUploadFileSize < quotaResult.AllowedSize {
  177. return c.User.Filters.MaxUploadFileSize, nil
  178. }
  179. }
  180. return quotaResult.AllowedSize, nil
  181. }
  182. // AllocateSpace implements ClientDriverExtensionAllocate interface
  183. func (c *Connection) AllocateSpace(size int) error {
  184. c.UpdateLastActivity()
  185. // check the max allowed file size first
  186. if c.User.Filters.MaxUploadFileSize > 0 && int64(size) > c.User.Filters.MaxUploadFileSize {
  187. return common.ErrQuotaExceeded
  188. }
  189. // we don't have a path here so we check home dir and any virtual folders
  190. // we return no error if there is space in any folder
  191. folders := []string{"/"}
  192. for _, v := range c.User.VirtualFolders {
  193. // the space is checked for the parent folder
  194. folders = append(folders, path.Join(v.VirtualPath, "fakefile.txt"))
  195. }
  196. for _, f := range folders {
  197. quotaResult := c.HasSpace(false, false, f)
  198. if quotaResult.HasSpace {
  199. if quotaResult.QuotaSize == 0 {
  200. // unlimited size is allowed
  201. return nil
  202. }
  203. if quotaResult.GetRemainingSize() > int64(size) {
  204. return nil
  205. }
  206. }
  207. }
  208. return common.ErrQuotaExceeded
  209. }
  210. // RemoveDir implements ClientDriverExtensionRemoveDir
  211. func (c *Connection) RemoveDir(name string) error {
  212. c.UpdateLastActivity()
  213. return c.BaseConnection.RemoveDir(name)
  214. }
  215. // Symlink implements ClientDriverExtensionSymlink
  216. func (c *Connection) Symlink(oldname, newname string) error {
  217. c.UpdateLastActivity()
  218. return c.BaseConnection.CreateSymlink(oldname, newname)
  219. }
  220. // ReadDir implements ClientDriverExtensionFilelist
  221. func (c *Connection) ReadDir(name string) ([]os.FileInfo, error) {
  222. c.UpdateLastActivity()
  223. return c.ListDir(name)
  224. }
  225. // GetHandle implements ClientDriverExtentionFileTransfer
  226. func (c *Connection) GetHandle(name string, flags int, offset int64) (ftpserver.FileTransfer, error) {
  227. c.UpdateLastActivity()
  228. fs, p, err := c.GetFsAndResolvedPath(name)
  229. if err != nil {
  230. return nil, err
  231. }
  232. if c.GetCommand() == "COMB" && !vfs.IsLocalOsFs(fs) {
  233. return nil, errCOMBNotSupported
  234. }
  235. if flags&os.O_WRONLY != 0 {
  236. return c.uploadFile(fs, p, name, flags)
  237. }
  238. return c.downloadFile(fs, p, name, offset)
  239. }
  240. func (c *Connection) downloadFile(fs vfs.Fs, fsPath, ftpPath string, offset int64) (ftpserver.FileTransfer, error) {
  241. if !c.User.HasPerm(dataprovider.PermDownload, path.Dir(ftpPath)) {
  242. return nil, c.GetPermissionDeniedError()
  243. }
  244. if !c.User.IsFileAllowed(ftpPath) {
  245. c.Log(logger.LevelWarn, "reading file %#v is not allowed", ftpPath)
  246. return nil, c.GetPermissionDeniedError()
  247. }
  248. file, r, cancelFn, err := fs.Open(fsPath, offset)
  249. if err != nil {
  250. c.Log(logger.LevelWarn, "could not open file %#v for reading: %+v", fsPath, err)
  251. return nil, c.GetFsError(fs, err)
  252. }
  253. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, fsPath, ftpPath, common.TransferDownload,
  254. 0, 0, 0, false, fs)
  255. t := newTransfer(baseTransfer, nil, r, offset)
  256. return t, nil
  257. }
  258. func (c *Connection) uploadFile(fs vfs.Fs, fsPath, ftpPath string, flags int) (ftpserver.FileTransfer, error) {
  259. if !c.User.IsFileAllowed(ftpPath) {
  260. c.Log(logger.LevelWarn, "writing file %#v is not allowed", ftpPath)
  261. return nil, c.GetPermissionDeniedError()
  262. }
  263. filePath := fsPath
  264. if common.Config.IsAtomicUploadEnabled() && fs.IsAtomicUploadSupported() {
  265. filePath = fs.GetAtomicUploadPath(fsPath)
  266. }
  267. stat, statErr := fs.Lstat(fsPath)
  268. if (statErr == nil && stat.Mode()&os.ModeSymlink != 0) || fs.IsNotExist(statErr) {
  269. if !c.User.HasPerm(dataprovider.PermUpload, path.Dir(ftpPath)) {
  270. return nil, c.GetPermissionDeniedError()
  271. }
  272. return c.handleFTPUploadToNewFile(fs, fsPath, filePath, ftpPath)
  273. }
  274. if statErr != nil {
  275. c.Log(logger.LevelError, "error performing file stat %#v: %+v", fsPath, statErr)
  276. return nil, c.GetFsError(fs, statErr)
  277. }
  278. // This happen if we upload a file that has the same name of an existing directory
  279. if stat.IsDir() {
  280. c.Log(logger.LevelWarn, "attempted to open a directory for writing to: %#v", fsPath)
  281. return nil, c.GetOpUnsupportedError()
  282. }
  283. if !c.User.HasPerm(dataprovider.PermOverwrite, path.Dir(ftpPath)) {
  284. return nil, c.GetPermissionDeniedError()
  285. }
  286. return c.handleFTPUploadToExistingFile(fs, flags, fsPath, filePath, stat.Size(), ftpPath)
  287. }
  288. func (c *Connection) handleFTPUploadToNewFile(fs vfs.Fs, resolvedPath, filePath, requestPath string) (ftpserver.FileTransfer, error) {
  289. quotaResult := c.HasSpace(true, false, requestPath)
  290. if !quotaResult.HasSpace {
  291. c.Log(logger.LevelInfo, "denying file write due to quota limits")
  292. return nil, common.ErrQuotaExceeded
  293. }
  294. file, w, cancelFn, err := fs.Create(filePath, 0)
  295. if err != nil {
  296. c.Log(logger.LevelWarn, "error creating file %#v: %+v", resolvedPath, err)
  297. return nil, c.GetFsError(fs, err)
  298. }
  299. vfs.SetPathPermissions(fs, filePath, c.User.GetUID(), c.User.GetGID())
  300. // we can get an error only for resume
  301. maxWriteSize, _ := c.GetMaxWriteSize(quotaResult, false, 0, fs.IsUploadResumeSupported())
  302. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath,
  303. common.TransferUpload, 0, 0, maxWriteSize, true, fs)
  304. t := newTransfer(baseTransfer, w, nil, 0)
  305. return t, nil
  306. }
  307. func (c *Connection) handleFTPUploadToExistingFile(fs vfs.Fs, flags int, resolvedPath, filePath string, fileSize int64,
  308. requestPath string) (ftpserver.FileTransfer, error) {
  309. var err error
  310. quotaResult := c.HasSpace(false, false, requestPath)
  311. if !quotaResult.HasSpace {
  312. c.Log(logger.LevelInfo, "denying file write due to quota limits")
  313. return nil, common.ErrQuotaExceeded
  314. }
  315. minWriteOffset := int64(0)
  316. // ftpserverlib sets:
  317. // - os.O_WRONLY | os.O_APPEND for APPE and COMB
  318. // - os.O_WRONLY | os.O_CREATE for REST.
  319. // - os.O_WRONLY | os.O_CREATE | os.O_TRUNC if the command is not APPE and REST = 0
  320. // so if we don't have O_TRUNC is a resume.
  321. isResume := flags&os.O_TRUNC == 0
  322. // if there is a size limit remaining size cannot be 0 here, since quotaResult.HasSpace
  323. // will return false in this case and we deny the upload before
  324. maxWriteSize, err := c.GetMaxWriteSize(quotaResult, isResume, fileSize, fs.IsUploadResumeSupported())
  325. if err != nil {
  326. c.Log(logger.LevelDebug, "unable to get max write size: %v", err)
  327. return nil, err
  328. }
  329. if common.Config.IsAtomicUploadEnabled() && fs.IsAtomicUploadSupported() {
  330. err = fs.Rename(resolvedPath, filePath)
  331. if err != nil {
  332. c.Log(logger.LevelWarn, "error renaming existing file for atomic upload, source: %#v, dest: %#v, err: %+v",
  333. resolvedPath, filePath, err)
  334. return nil, c.GetFsError(fs, err)
  335. }
  336. }
  337. file, w, cancelFn, err := fs.Create(filePath, flags)
  338. if err != nil {
  339. c.Log(logger.LevelWarn, "error opening existing file, flags: %v, source: %#v, err: %+v", flags, filePath, err)
  340. return nil, c.GetFsError(fs, err)
  341. }
  342. initialSize := int64(0)
  343. if isResume {
  344. c.Log(logger.LevelDebug, "upload resume requested, file path: %#v initial size: %v", filePath, fileSize)
  345. minWriteOffset = fileSize
  346. initialSize = fileSize
  347. if vfs.IsSFTPFs(fs) {
  348. // we need this since we don't allow resume with wrong offset, we should fix this in pkg/sftp
  349. file.Seek(initialSize, io.SeekStart) //nolint:errcheck // for sftp seek cannot file, it simply set the offset
  350. }
  351. } else {
  352. if vfs.IsLocalOrSFTPFs(fs) {
  353. vfolder, err := c.User.GetVirtualFolderForPath(path.Dir(requestPath))
  354. if err == nil {
  355. dataprovider.UpdateVirtualFolderQuota(&vfolder.BaseVirtualFolder, 0, -fileSize, false) //nolint:errcheck
  356. if vfolder.IsIncludedInUserQuota() {
  357. dataprovider.UpdateUserQuota(&c.User, 0, -fileSize, false) //nolint:errcheck
  358. }
  359. } else {
  360. dataprovider.UpdateUserQuota(&c.User, 0, -fileSize, false) //nolint:errcheck
  361. }
  362. } else {
  363. initialSize = fileSize
  364. }
  365. }
  366. vfs.SetPathPermissions(fs, filePath, c.User.GetUID(), c.User.GetGID())
  367. baseTransfer := common.NewBaseTransfer(file, c.BaseConnection, cancelFn, resolvedPath, requestPath,
  368. common.TransferUpload, minWriteOffset, initialSize, maxWriteSize, false, fs)
  369. t := newTransfer(baseTransfer, w, nil, 0)
  370. return t, nil
  371. }